Anda di halaman 1dari 3

International Journal of Computer Trends and Technology (IJCTT) volume 9 number 5 Mar 2014

ISSN: 2231-2803 http://www.ijcttjournal.org Page248



Embedding a Non-Standard Encryption/Decryption Method with
Mathematical Draw Function to Meet Challenges in Mobility

S. Lakshmi Priya
1
R.Lawrance
2


1. Scholar of Karpagam University, Computer Science Department, Coimbatore.
2. Director, Department of MCA, Ayya Nadar Janaki Ammal College, Sivakasi.
====================================================================
Abstract
Our innovation and personal information are
passes through air in wireless network and
their secrecy can be preserved by using any one
of the encryption method. Nowadays mobile plays
a vital role in passing messages and pictures.
New operating systems and functions were
introduced in order to handle mobile
operations due to restrictions on mobile like
storage capacity, size of mobile, availability of
tower, etc This article explains the concepts
of standard encryption and decryption methods,
how the non-standard encryption/decryption
methods used effectively to maintain secrecy, how
to convert mathematical symbol into secret form
in a quick manner, appearance of converted
encrypted form of mathematical figures and
embedding conversion and draw function by
considering restriction on mobility.

Keywords Challenges in Mobile, Encryption,
Embedding, Non-standard Encryption & Security
in Mobile

1. Introduction
Cryptography allows the sender and receiver to
exchange the secret messages so that a third
party cant intercept and read the data. During
early days through satellite dish, anyone can
watch whatever was being shown by satellite
television. In order to make the channels as paid
one, not only for cable subscribers and also for
satellite dish owners, Videocipher/Videocipher II
system was introduced to encrypt video signals.

Videocipher convert the video signal into digital
form, encrypt it, and send the data over the
satellite. For the paid satellite dish owner, the
Videocipher box in their end would convert the
signal and return it to its original, useful form.
This encryption and its original form uses key for
invert operation. Now there are many
standard and non-standard encryption techniques
are available.

2. Related Work
2.1 Tradition Cryptography System
Cryptography means secret writing. An
interceptor/intruder/adversary can make the
following threats:

Block message (affecting availability)
Intercept message (affecting secrecy)
Modify message (affecting integrity)
Fabricate message (affecting integrity)

Cryptography is the fundamental technique to
counter these threats because the outsider does not
understand the meaning of messages. A
cryptosystem is a 5 tuple (E,D,M,K,C), where M
is the set of plaintexts, K is the set of keys, C
is the set of ciphertexts, : KC is the
set of encipher (encryption) functions, and D:
C KM is the set of deciphering
(decryption) functions. Plaintext M: set of
messages in original form ; Ciphertext C: set of
messages in encrypted form.

Encryption is the process of encoding a message
so that its meaning is not obvious. It provides
confidentiality. Principle of encryption is very
hard to find out the message without knowing the
key and very easy to find out the message
knowing the key. Decryption is the process of
decoding an encrypted message to its original
form.

Encryption methods usually converts the given
text and picture into encrypted text/image. This
encrypted text/image can be converted again into
its original form using decryption method (vice
versa of encryption method). Standard method of
encryption uses keys to encrypt message. The key
which is used with encryption method is called as
secret key. The size of the key determines
strength of secret. When the size of the key is
International Journal of Computer Trends and Technology (IJCTT) volume 9 number 5 Mar 2014

ISSN: 2231-2803 http://www.ijcttjournal.org Page249

high it takes long time for conversion process but
more secured. For small size of the key the result
will be less secured and less time for conversion.
So selection of key will be depends on strength of
secrecy required and how long it is obligatory. If
the time period required for the secrecy is less,
then we can adopt small size of key. If it is more,
then it is advisable to select lengthy key to
strengthen the secrecy without considering the
time period taken for conversion process.
Cryptosystem falls into two major categories.

Symmetric cryptosystems are
classical cryptosystems

M =D(K, E(K, M)) The
encryption key and decryption
key are the same

Asymmetric cryptosystem

M =D(Kd, E(Ke, M)) - Kd is the
decryption key and Ke is the
encryption key and Kd Ke

3. Research Work
3.1. Mandatory of encryption
Nowadays the transfer of message became highly
mandatory from low to highly sophisticated
people. This happens through increases of
advanced technologies of communication media
from high to low cost. Maintaining secrecy is also
one of major task in the business world due to
more competiveness. Tender quotes are best
example where secrecy plays a vital role. When
passing these types of secret messages through
email or SMS requires fire walls or encryption
method. Mostly many of the intruders make a
hole in fire walls to theft the secret messages. So
it is advisable to use the encryption method to
maintain secrecy in secret messages. We can use
standard or non-standard encryption methods
depends on the period of secrecy, type of message
like military/ordinary, type of communication
media, size of the message etc

3.2. Challenges in mobility
There are wide range of operation systems for
mobile communication like iOS(Apple), Android,
Windows Phone 7, Blackberry, Symbian(Nokia)
and webOS(Palm) etc.. Most of these operating
systems lack fundamental requirements
such as backup, version control &
security. In addition, device vendors are
competing aggressively with one another,
introducing new versions of their mobiles.

Mobile technology is growing day by day and it
requires skill to develop and support mobile
applications. Many IT companies build their initial
development with quite modest goals. Only
limited operating systems and software were used
in mobile phones due to their restriction. The size
and execution time plays a major role in mobile
system. When selecting encryption method for
conversion process care must be taken to avoid
delay process in mobile because the user may get
irritate. The standard methods like DES, AES,
TRIPLE DES etc.., takes more time because of the
size of the key and more number of iterations to
complicate the predication of original text. So
these methods are not suitable for mobile system.
We can adopt some other non- standard
encryption method for conversion process because
of the restrictions in mobile system.

3.3. Mathematical symbol conversion
In research department the standard
mathematical symbols like lines, arrow, square,
triangle etc.., are used very often. If these symbols
were considered as image then there are numerous
pixels we have to contemplate to encrypt it. If we
deliberate only the required pixels for the symbols
like starting and ending points for a line, three
pairs of points for a triangle etc.., then it will be
easy to encrypt. That is when considering only
the required points for encryption it will take less
time for process and also requires less
memory. For conversion use a non-standard
encryption method which is suitable for small
communication devices. Store sequence of pixels
into an array and encrypt it.

3.4. Embedding conversion and drawing
To draw mathematical symbols use conversion
and draw functions. Firs read the points of
mathematical symbols which are to be encrypted.
Then convert these points into encrypted points.
The decryption process converts the encrypted
points into its original arguments. These points
are used to draw the original symbols with using
any one of the software. So embed draw function
with decryption o draw the required mathematical
symbols. Embedding software can be done
through calling function inside the decryption
method.
International Journal of Computer Trends and Technology (IJCTT) volume 9 number 5 Mar 2014

ISSN: 2231-2803 http://www.ijcttjournal.org Page250



Steps required for encryption process

Read the required points and convert
into array
Convert into encrypted points using
non-standard encryption method

Steps required for embedding concepts in
decryption

Use non-standard decryption method
to decrypt the points and store into an
array
Call draw function to draw required
mathematical symbol

4. Conclusion
Traditional encryption methods can be used when
there is a need for additional confidentiality. To
sustain secrecy in mobile communication at a
considerable faster rate we can use a non-
standard encryption method due to restrictions in
mobility. When there is a need to preserve the
secret message for a short period, we can suggest
embedding conversion with draw method which
uses a non-standard encryption/decryption method
to secure message with rapid speed. In future this
concept can be implemented through any one of
high level language and time stamp can be
calculated.








References

Matt Bishop, Introduction to Computer
Security, Addison- Wesley, 2004, ISBN:
0321247442
Matt Bishop, Computer Security: Art and
Science, Addison- Wesley, 2002, ISBN:
0201440997
http://www.cio.co.uk/article/3306640/the-3-
challenges-of-mobility/?pn=2
Howard Anton and Christ Rorres. Elementary
Linear Algebra Application Version. 6th
edition. J ohn Wiley & Sons, INC.
Eisenberg, Murray. Hill Ciphers and Modular Linear
Algebra. 3 Nov 1999
<http://www.math.umass.edu/~murray/Hillciph.pdf>
Goulet, J ohn. Project #6 Cryptography.
<http://www.prenhall.com/divisions/esm/app/ph-
linear/kolman/html/proj6.html>
"Fighting Computer Crime, A New Framework for
Protecting Information," By Donn Parker and
published by J ohn Wiley & Sons
Information security awareness in UAE: A survey
paper
http://mathforum.org/library/drmath/view/52756.h
tml
http://email.about.com/od/freeemailreviews/tp/fre
e_email.htm
Doe, J ane. "How to Cite Information
from an E-mail." E-mail to J oe Schmo.
Nov.2003
Cryptography: A New Dimension in Computer
Data Security--A Guide for the Design and
implementation of secure systems

Anda mungkin juga menyukai